International audienceThe rising number of attacks targeting processors at micro-architecture level encourages more research on hardware level solutions.In this position paper, we specify a new RV32S “secure” instruction set architecture (ISA) derived from the RV32I RISC-V ISA.We propose modifications in the ISA to prevent timing side-channels, strengthen control flow integrity and ensure micro-architectural state isolation.The goal is to provide a new minimal hardware/software approach through which software attacks exploiting hardware vulnerabilities can be circumvented
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
As computer software grow larger in size and complexity, there is an ever increasing concern over se...
International audienceThis chapter presents an instruction set architecture (ISA) dedicated to the r...
International audienceThe rising number of attacks targeting processors at micro-architecture level ...
International audienceTiming side-channels are an identified threat for security critical software. ...
Timing side-channels are an identified threat for security critical software. Existing countermeasur...
In recent years, the computing landscape has witnessed a shift towards hardware specialization in re...
For over two-and-a-half decades, dating to the first widespread commercial deployment of the Interne...
Soft errors in embedded systems' memories like single-event upsets and multiple-bit upsets lead to d...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
A processor plays an important role in the security of an entire embedded system. There are two reas...
Part 6: Software SecurityInternational audienceRecently, code-reuse attack (CRA) is becoming the mos...
Speculative attacks are still an active threat today that, even if initially focused on the x86 plat...
As the interface between hardware and software, Instruction Set Architectures (ISAs) play a key role...
Information-flow control (IFC) enforcing languages can provide high assurance that software does no...
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
As computer software grow larger in size and complexity, there is an ever increasing concern over se...
International audienceThis chapter presents an instruction set architecture (ISA) dedicated to the r...
International audienceThe rising number of attacks targeting processors at micro-architecture level ...
International audienceTiming side-channels are an identified threat for security critical software. ...
Timing side-channels are an identified threat for security critical software. Existing countermeasur...
In recent years, the computing landscape has witnessed a shift towards hardware specialization in re...
For over two-and-a-half decades, dating to the first widespread commercial deployment of the Interne...
Soft errors in embedded systems' memories like single-event upsets and multiple-bit upsets lead to d...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
A processor plays an important role in the security of an entire embedded system. There are two reas...
Part 6: Software SecurityInternational audienceRecently, code-reuse attack (CRA) is becoming the mos...
Speculative attacks are still an active threat today that, even if initially focused on the x86 plat...
As the interface between hardware and software, Instruction Set Architectures (ISAs) play a key role...
Information-flow control (IFC) enforcing languages can provide high assurance that software does no...
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
As computer software grow larger in size and complexity, there is an ever increasing concern over se...
International audienceThis chapter presents an instruction set architecture (ISA) dedicated to the r...